Sciweavers

3206 search results - page 193 / 642
» Functional Variant Modeling for Adaptable Functional Network...
Sort
View
ASIACRYPT
2000
Springer
15 years 6 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
MOBICOM
1999
ACM
15 years 6 months ago
Next Century Challenges: RadioActive Networks
A key challenge facing wireless networking is to utilize the spectrum as e ciently as possible given current channel conditions and in the most e ective way for each application. ...
Vanu G. Bose, David Wetherall, John V. Guttag
166
Voted
IV
2008
IEEE
296views Visualization» more  IV 2008»
15 years 8 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
129
Voted
COLT
1995
Springer
15 years 6 months ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais
INFORMATICALT
2000
118views more  INFORMATICALT 2000»
15 years 2 months ago
Hexagonal Approach and Modeling for the Visual Cortex
In this paper, the hexagonal approach was proposed for modeling the functioning of cerebral cortex, especially, the processes of learning and recognition of visual information. Thi...
Algis Garliauskas, Alvydas Soliunas